General

  • Target

    2024-03-13_670f1049cac50787a52968e92246cd4b_cryptolocker

  • Size

    115KB

  • MD5

    670f1049cac50787a52968e92246cd4b

  • SHA1

    3c8d59b1ef3abcad9097ba904d7b40ededef77d6

  • SHA256

    38fbf89bf07e1f4ea2ea330019d39d8c7a2de84828f289de9aa1939fea0e8695

  • SHA512

    9d889389bb3c381b0c0e960ada6ccd6bbc917ca7b466d1d862f6c745b45e8f8b7830896995ab18d268636829caf6e980b3cc8c0d06059d1f8c770908316890e9

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar//f:T6a+rdOOtEvwDpjLzi

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_670f1049cac50787a52968e92246cd4b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections